Jassim Happa
Jassim Happa
Lecturer in Information Security, Royal Holloway
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
832013
Illuminating the past: state of the art
J Happa, M Mudge, K Debattista, A Artusi, A Gonçalves, A Chalmers
Virtual reality 14 (3), 155-182, 2010
702010
Virtual relighting of a roman statue head from herculaneum: a case study
J Happa, M Williams, G Turley, G Earl, P Dubla, G Beale, G Gibbons, ...
Proceedings of the 6th International Conference on Computer Graphics …, 2009
222009
Detecting disguised processes using Application-Behavior Profiling
C Vaas, J Happa
IEEE International Symposium on Technologies for Homeland Security, 2017
182017
The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti.
J Happa, A Artusi, P Dubla, T Bashford-Rogers, K Debattista, V Hulusic, ...
International Symposium on Virtual Reality, Archaeology, and Cultural …, 2009
162009
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
IEEE Security and Privacy Workshops (SPW), 286-295, 2016
152016
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
S Creese, M Goldsmith, N Moffat, J Happa, I Agrafiotis
IEEE Conference on Technologies for Homeland Security, 7, 2013
152013
A re-painted amazon
G Earl, G Beale, J Happa, M Williams, G Turley, K Martinez, A Chalmers
142009
A Model to Facilitate Discussions about Cyber Attacks
J Happa, G Fairclough
Springer Ethics and Policies for Cyber Operation: A NATO Cooperative Cyber …, 2017
122017
Cyber Security Threats and Challenges in Collaborative Mixed-Reality
J Happa, M Glencross, A Steed
Frontiers in ICT-Virtual Environments, 2019
112019
Insider-threat detection using gaussian mixture models and sensitivity profiles
K Al Tabash, J Happa
Computers & Security 77, 838-859, 2018
102018
Cultural Heritage Predictive Rendering
J Happa, T Bashford‐Rogers, A Wilkie, A Artusi, K Debattista, A Chalmers
Computer Graphics Forum 31 (6), 1823-1836, 2012
102012
GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements
A Rodriguez-Mota, PJ Escamilla-Ambrosio, J Happa, E Aguirre-Anaya
AFI 360 Conference Track on Future Internet and Internet of Things Applications, 2016
62016
Assessing a virtual baby feeding training system
A Petrasova, G Czanner, J Happa, S Czanner, D Wolke, A Chalmers
Proceedings of the 7th international conference on computer graphics …, 2010
62010
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
J Nicholls, D Peters, A Slawinski, T Spoor, S Vicol, J Happa, M Goldsmith, ...
TPCG, 9-16, 2013
52013
High dynamic range video for cultural heritage documentation and experimental archaeology
J Happa, A Artusi, S Czanner, A Chalmers
Proceedings of the 11th International conference on Virtual Reality …, 2010
52010
Sonification to Support the Monitoring Tasks of Security Operations Centres
L Axon, J Happa, A Janse van Rensburg, M Goldsmith, S Creese
IEEE Transactions on Dependable and Secure Computing, 1-18, 2019
42019
Hearing Attacks in Network Data: an Effectiveness Study
L Axon, J Happa, M Goldsmith, S Creese
Computers & Security 83, 367-388, 2019
42019
A survey of keylogger and screenlogger attacks in the banking sector and countermeasures to them
H Sbai, M Goldsmith, S Meftali, J Happa
CSS International Symposium on Cyberspace Safety and Security, 2018
42018
Classification of Malware Families Based on Runtime Behaviour
M Geden, J Happa
CSS International Symposium on Cyberspace Safety and Security, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20